Third Wall's 56 policies can be deployed protection across a single Location, across an entire Client, or across all of your managed computers. Monitors run every 5 minutes, auto-correcting if needed and notifying you of any discrepancies. Some policies, such a Monitor for Ransomware, have hair-trigger monitors that immediately detect issues and initiate instant response to mitigate damage and prevent spread of malware. At a glance, you can see the status of every policy, and can easily change settings, apply temporary policy suspensions, even make exceptions to any computer. Third Wall makes cybersecurity protection simple for you.

Third Wall captures critical Logon data for every client, giving you a full month look-back for every User logon, logoff, computer unlock and computer lock event. Sorted by User / Domain / Computer / Time, this report gives your clients a full record of all activity, and can show not only if someone was logged on, but also if they were working. This information is necessary for any audit compliance. The accompanying Dataview allows you to quickly answer the client question - "was someone in the office after hours last night?" Your clients want this information.

Third Wall makes you the Operational Cybersecurity expert in minutes. With powerful policies, quick-acting emergency response buttons, and indispensable reports, you and your clients need this protection. Way too much gets past firewalls and antivirus, and the primary ways in are closed off by Third Wall. Data theft by employees and contractors is rampant, but Third Wall shuts that down. Your clients are worried - as they should be - and you can be the hero who provides the best protection. Start a free, unlimited use 30-day trial at www.Third-Wall.com today, find out what it can do for you.

Integration

ConnectWise Automate

Requirements:
Third Wall Version 2.0.5.4 and above are certified to work with all Automate 10.5 and Automate 11 versions. As a standalone plugin, it does not integrate other products into Automate.

Features:

Provides lockdown using 56 policies to prevent common entry paths for malware, to prevent data theft, and to automatically detect and mitigate ransomware attacks

Make exceptions to any policy for any given computer

Provides emergency action buttons for immediate response to isolate an infected computer and to lockout / annihilate lost or stolen computers